期刊文献+

基于能量管理的网络入侵防波动控制方法研究 被引量:23

Research on Prevention Fluctuation Control method of Network Intrusion Based on Energy Management
下载PDF
导出
摘要 网络入侵的进攻阶段会使网络产生巨大的波动。这给网络入侵的准确检测带来了困难,传统的防波动方法采用减少网络连接,以减少网络入侵带来的波动,这种方法能减少波动,但同时存在网络连接时间短,不能满足网络数据包传输通信中断严重等限制问题;针对这一问题,提出将能量管理防波动方法应用于网络入侵防波动的新思想;对网络入侵的能量梯度进行设计,确定了最大入侵种类剖面和最大入侵数量剖面,对纵向控制入侵律和侧向控制入侵律分别进行设计。通过Matlab-simulink建立入侵防波动仿真系统,对提出的防波动方法进行仿真,仿真结果表明在该方法导引下,网络入侵时,入侵者减少了对网络的入侵,并且对网络入侵的幅度大大降低,使网络入侵波动大为变小,使网络入侵的检测准确率提高了34.2%。 In the attack stage of network intrusion, there is huge fluctuation. It is hard to detect the network intrusion. Traditionally, the prevention fluctuation method was reducing the network connection, but the network connection time was short, it would result in network packet transmission interruption. The energy management prevention fluctuation method was applied in the network intrusion prevention fluctuation. The energy gradient of network in- trusion was designed. The largest invasion species number section and the largest invasion profile were determined. The longitudinal control invasion rule and lateral control invasion rule were designed correspondingly. The simulation system was established based on Matlab - simulink. Simulation results show that the network intrusion is reduced with new method, the intrusion range is reduced greatly, and the fluctuation decreases greatly. The intrusion detection accuracy rate increases by 34.2%.
作者 黎峰 吴春明
出处 《计算机仿真》 CSCD 北大核心 2013年第12期45-48,335,共5页 Computer Simulation
关键词 网络入侵 控制入侵律 能量管理 入侵防波动 Network Intrusion intrusion control rule energy management intrusion prevention fluctuation
  • 相关文献

参考文献10

  • 1Abusalah L, Khokhar A, Guizani M. A survey of secure mobile Ad Hoc routing protocols [ J ]. IEEE Communications Surveys&Tutorials, 2008,10 (4) :78 - 93.
  • 2Brutch P, Ko C. Challenges in Intrusion Detection for Wireless Ad -hoc Networks[ J]. In: 2003 Symposium on Applications and the intemet Workshops (SAINT'03 Workshops),2003.
  • 3于尧,李喆,刘军.移动自组网中一种基于信誉的安全分簇算法[J].东北大学学报(自然科学版),2009,30(9):1257-1261. 被引量:6
  • 4Varadharajan V, Shankaran R, Hitchens M. Security for cluster based Ad Hoc networks [ J ]. Computer Communication, 2004,27 (5) :488 -501.
  • 5Yongguang Zhang, Wenke Lee. Intrusion Detection in Wireless AdHoc Networks [C]//Proceedings of the 6thAnnual International Conference on Mobile Computing and Networking. Boston:Massa- chussetts ,2000:6 - 11.
  • 6吴建平,林嵩,徐恪,刘莹,朱敏.可演进的新一代互联网体系结构研究进展[J].计算机学报,2012,35(6):1094-1108. 被引量:60
  • 7颜谦和,颜珍平.遗传算法优化的神经网络入侵检测系统[J].计算机仿真,2011,28(4):141-144. 被引量:19
  • 8Jun C, Xiaowei C. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ] //J Information Technology and Applica- tions (IFITA), 2010 International Forum on. IEEE, 2010, 1 : 384 -388.
  • 9Yu Z. Study on intrusion IPv6 detection system on LINUX [ C ]// Computational Intelligence and Industrial Applications, 2009. PA- CIIA 2009. Asia - Pacific Conference on. IEEE, 2009, 2 : 5 - 8.
  • 10Jun C, Xiaowei C. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ] JJ Information Technology and Applica- tions (IFITA), 2010 International Forum on. IEEE, 2010, 1: 384 - 388.

二级参考文献17

  • 1穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 2杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 3周荃,王崇骏,王珺,周新民,陈世福.基于人工智能技术的网络入侵检测的若干方法[J].计算机应用研究,2007,24(5):144-149. 被引量:33
  • 4Rachedi A, Benslimane A. Trust and mobility-based clustering algorithm for secure mobile Ad Hoc networks [ C ] // ICSNC. Tahiti: IEEE, 2006 : 72 - 77.
  • 5Er I I, Seah W K G. Mobility-based d-hop clustering algorithm for mobile Ad Hoc networks [ C ] // WCNC. Atlanta: IEEE, 2004:2359 - 2364.
  • 6Sheu P R, Wang C W. A stable clustering algorithm based on battery power for mobile AA Hoc networks [ J ]. Tam]eang Journal of Science and Engineering, 2006,9(3) :233 - 242.
  • 7Konstantopoulos C, Gavalas D, Pantziou G. Clustering in mobile Ad Hoc networks through neighborhood stability-based mobility prediction [ J ]. Computer Networks, 2008, 52 (9) : 1797 - 1824.
  • 8Er I I, Seah W K G. Clustering overhead and convergence time analysis of the mobility-based multi-hop clustering algorithm for mobile Ad Hoc networks [ J ]. Journal of Computer and System Sciences, 2006,72(7) : 1144 - 1155.
  • 9Yan L S, Wei Y, Zhu H, et al. Information theoretic framework of trust modeling and evaluation for Ad Hoc networks [ J ]. IEEE Journal on Selected Areas in Communications, 2006,24(2) :305 - 317.
  • 10Royer E M, MeUiar-Smith P M, Moser L E. An analysis of the optimum node density for Ad Hoc mobile networks[ C]// ICC. Helsinki: IEEE, 2001:857 - 861.

共引文献80

同被引文献140

  • 1HE Zhaoshui XIE Shengli FU Yu.Sparse representation and blind source separation of ill-posed mixtures[J].Science in China(Series F),2006,49(5):639-652. 被引量:24
  • 2Gross J,Janke W,Banchmann M.Massively parallelized replica-exchange simulations of polymers on GPUs [J].Comput.Phys.Comm.,2011,182:1638-1644.
  • 3Xie S L, Liu Y, Yang J M, et al. Time-Frequency Approach to Underdetermined Blind Source Separation[J]. IEEE Transac- tions on Neural Networks and Learning Systems, 2012,23 (2): 306-315.
  • 4Alfaro V M, Vilanovab R. Robust tuning of 2DoF five-parameter PID controllers for inverse response controlled processes[J].Journal of Process Control,2013,23(4):453-462.
  • 5Chang Y L,Lin T L: Network-based H.264/AVC whole flame loss visibility model and frame dropping methods[J].IEEE Transactions on Image Processing,2012,21(8):3353-3363.
  • 6Du Q S, Jiang B H.Design and Implementation of the Embedded Based Web Camera System[J].Journal of Software, 2012,7(11): 2560-2566.
  • 7Hartenstein H, Laberteaux K P. A tutorial survey on vehicular ad hoc networks[J].IEEE Communications Magazine,2008,46 (6): 164-171.
  • 8Gustavo M ,Marco R ,Alessandro A ,et al.Safe driving in LA: Report from the Greatest Intervehicular Accident Detection Test Ever[J].IEEE Transactions on Vehicular Technology, 2013,62(2): 522-535.
  • 9Li M, Zeng K, Lou W J.Opportunistic broadcast of event-driven warning messages in vehicular Ad Hoc networks with lossy links[J], Computer Networks,2011, 55(10):2443-2464.
  • 10Pratap K S , Wu E K, Jagruti S ,et al.BAHG:Back-Bone-Assisted hop greedy routing for VANET's city environments[J]. IEEE Transactions on Intelligent Transportation Systems, 2013, 14(1) :199-213.

引证文献23

二级引证文献169

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部